Plato Data Intelligence.
Vertical Search & Ai.

US States Seek Ways to Help Communities Build Cyber Defenses

Date:

As CISO for the state of North Dakota, Michael Gregg says that one of his first duties was meeting with the North Dakota Insurance Reserve Fund (NDIRF), a nonprofit organization that provides risk and insurance services to the state’s political infrastructure. At the time, NDIRF offered a 4% insurance discount to any municipality, agency, or other entity that first implemented endpoint detection and response, antivirus, and security awareness training.

Allocating funds from grants to implement these cybersecurity controls would reduce cyber insurance costs for municipalities, schools, hospitals, and other government agencies and facilities. That lets the state create long-term cost savings while frontloading the costs of implementation. Setting up a security system that does not rely on heavy funding after grants dry up is essential, Gregg says.

States are exploring new methods to provide security resources to their local organizations and citizens. To help, the US Infrastructure Investment and Jobs Act (IIJA) of 2021 established the State and Local Cybersecurity Grant Program (SLCGP). This year’s $375 million in SLCGP funding is driving innovation, and today more than 30 states have cybersecurity task forces. The challenge state CISOs and task forces face is using their funding wisely, not building infrastructures with long-term obligations that outlive federal grants.

States + Other States

While Gregg says he gets quality threat intelligence from the Department of Homeland Security and the Multi-State Information Sharing and Analysis Center (MS-ISAC), he appreciates the nonfiltered data he gets from talking directly with other state CISOs about their experiences. Picking up a phone and talking to another state CISOs is faster and provides more actionable data, he says.

Jeff Brown, CISO for the state of Connecticut, agrees. While Connecticut leverages free MS-ISAC tools and services throughout the state, such as implementing the Malicious Domain Blocking and Reporting (MDBR) tools, jointly developed by CISA and Akamai, Brown also is a fan of talking directly to colleagues. He shares and obtains threat intelligence generated within the state with other CISOs.

“The cross collaboration is unbelievably good,” Brown says. Unlike commercial ISACs such as the financial services ISAC, the members of the MS-ISAC are not in competition with each other. “We can share very, very candidly with each other in terms of what’s working and what’s not working. And we don’t have to sanitize it too much.”

As the state’s CISO, Brown notes that he does not have the authority to force municipalities and other local and regional governmental bodies to take specific security actions. However, by offering support, tools, and guidance to the many entities in the state, many in rural areas, he can facilitate cybersecurity improvements that ultimately help secure key resources and operations.

The state’s CISO office doesn’t have access to the various communities’ or local agencies’ environments, so those groups have to do their own IT work, Brown says. “The easier we can make it, the more we can remove the friction, and make services easy to say yes [to],” the more secure the communities will be, he says.

States + Vendors

“Cybersecurity is a team sport [that] requires innovative approaches and collaboration on operational strategies between the public and private sectors,” says Craig Harber, security evangelist at Open Systems. “The public sector would benefit from greater awareness and visibility into cybersecurity risks across US networks provided by the private sector, and the private sector would benefit from advisories, resources, and notifications of potential and existing threats provided by the public sector.”

To help with this alliance, Minnesota is setting up agreements with vendors to provide security tools to local operations in order to make the federal grant funding go further, says Michael Porier, managing director at the consulting firm Protiviti. These agreements allow states to provide tools that the smaller governmental entities might not otherwise have, he says.

There is no obligation to use the tools the state provides, but the municipalities get them for free or at highly discounted prices. Another benefit of the state-vendor relationship, Porier notes, is that the tools are vetted to ensure they work well together, so the community doesn’t end up with a collection of products that require very expensive integration.

States + Staffing

A major issue for the public sector is finding trained staff willing to take less money than they’d get at comparable private sector positions. “If they could do just the basic blocking and tackling and do it well, it would cover 90% of the key threats that are out there,” Porier says.

Jonathan Trull, CISO and senior vice president of security solutions architecture at Qualys, worked with Colorado state officials and the state’s cybersecurity task force to fill the talent gap. One tactic the state used was developing programs to recruit and train nontraditional cyber talent to help place them with one of the local entities.

“There were boot camps that we would partner with in the state that would, for example, take someone out of the military, and instead of going to college for four more years, you could get the basic skills from a boot camp,” Trull says. “We would then reach out to our contacts in local government and let them know we had a great network engineer who’s looking for their first job.

“We even offered internships at the state for some of those candidates to help them gain six months of practical experience,” he continues. “If there wasn’t a job available at the state, we’d try to look for a role within one of the participating counties or governments. That’s one of the most impactful things you can do.”

spot_img

Latest Intelligence

spot_img

Chat with us

Hi there! How can I help you?